diff options
author | Stephen Rothwell <sfr@canb.auug.org.au> | 2017-02-13 22:22:20 +0100 |
---|---|---|
committer | David S. Miller <davem@davemloft.net> | 2017-02-15 04:27:31 +0100 |
commit | 5463b3d043826ff8ef487edbd1ef1bfffb677437 (patch) | |
tree | e055421d871a49b3cb4417696c29a01e019bb9a4 /tools/include | |
parent | tcp: tcp_probe: use spin_lock_bh() (diff) | |
download | linux-5463b3d043826ff8ef487edbd1ef1bfffb677437.tar.xz linux-5463b3d043826ff8ef487edbd1ef1bfffb677437.zip |
bpf: kernel header files need to be copied into the tools directory
Signed-off-by: Stephen Rothwell <sfr@canb.auug.org.au>
Acked-by: Alexei Starovoitov <ast@kernel.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'tools/include')
-rw-r--r-- | tools/include/uapi/linux/bpf.h | 7 |
1 files changed, 7 insertions, 0 deletions
diff --git a/tools/include/uapi/linux/bpf.h b/tools/include/uapi/linux/bpf.h index 0eb0e87dbe9f..d2b0ac799d03 100644 --- a/tools/include/uapi/linux/bpf.h +++ b/tools/include/uapi/linux/bpf.h @@ -116,6 +116,12 @@ enum bpf_attach_type { #define MAX_BPF_ATTACH_TYPE __MAX_BPF_ATTACH_TYPE +/* If BPF_F_ALLOW_OVERRIDE flag is used in BPF_PROG_ATTACH command + * to the given target_fd cgroup the descendent cgroup will be able to + * override effective bpf program that was inherited from this cgroup + */ +#define BPF_F_ALLOW_OVERRIDE (1U << 0) + #define BPF_PSEUDO_MAP_FD 1 /* flags for BPF_MAP_UPDATE_ELEM command */ @@ -171,6 +177,7 @@ union bpf_attr { __u32 target_fd; /* container object to attach to */ __u32 attach_bpf_fd; /* eBPF program to attach */ __u32 attach_type; + __u32 attach_flags; }; } __attribute__((aligned(8))); |